I`m runnina an Ubuntu server 10.10 (EOL) with ISPConfig 3.0.5.3 who has been exploited using php/cgi: "GET /cgi-bin/php?-d+allow_url_include%3Don+-d+safe_mode%3Doff+-d+suhosin%2Esimulation%3Don+-d+max_execution_time%3D0+-d+di$" The exploits is a known issue in PHP5.3.3 Does annyone have a easy fix for this issue? -do release upgrade? (A bit risky?) -upgrade PHP? How? Any issues running the newest OS supported version of PHP?
You should do a release upgarde. Thats risky off course, but running a server with a linux version that is eol is very risky as well. ISPConfig works fine with all current ubuntu versions and the php versions that are part of them.
Thanks for "leading" me in the right direction, I did a release upgrade and are now running 12.04 LTS.